National Security Considerations in China s Financial Sectors an International Perspective.
|
|
- Eleanore Strickland
- 8 years ago
- Views:
Transcription
1 9 September 2015 National Security Considerations in China s Financial Sectors an International Perspective. National Security Considerations in China s Financial Sectors an International Perspective Background China s National Security Law 1 and its subordinate laws and regulations, some of which are still drafts, 2 raise a wide range of issues under the label of national security for policy makers, investors and other stakeholders. By consolidating existing regulations and introducing new requirements, giving them the status of national law, the new law paves the way for existing legal concepts to be more broadly defined in future regulations. For financial institutions, the new law may lead to increased regulation in financial transactions, IT architecture, data protection and other aspects of daily operation. Though the National Security Law s function is to set out broad principles without a corresponding sanctions regime, the implications for its future implementing rules are profound. Accordingly, this guide introduces the key considerations which the new national security regime poses for financial institutions operating in the PRC, 3 including their business relationships with entities in the PRC. PART A: GENERAL REQUIREMENTS Security of the financial system The PRC government s concerns of preventing systemic and regional financial risks and defending against the impact of external financial risks are included in the National Security Law as part of the elements that go towards Contents Background... 1 PART A: GENERAL REQUIREMENTS... 1 Security of the financial system... 1 National security review... 2 Prevention of terrorism... 3 PART B: IT INFRASTRUCTURE... 3 General requirement to develop secure and controllable infrastructure... 4 Supplier/partner selection... 5 IT specifications/certifications... 5 Pre-installed backdoors and pre-clearance of encryption schemes... 6 IT network regulation... 6 PART C: DATA SECURITY AND ONSHORING... 7 Data onshoring... 7 Protection of personal data. 8 Data monitoring... 8 Key References National Security Law of the PRC ( 中 华 人 民 共 和 国 国 家 安 全 法 ), 1 July These primarily include: Anti-Terrorism Law of the People s Republic of China (Draft) ( 中 华 人 民 共 和 国 反 恐 怖 主 义 法 ( 草 案 )), 3 November 2014; Cyber Security Law of the PRC (Draft) ( 中 华 人 民 共 和 国 网 络 安 全 法 ( 草 案 )), 6 July 2015; and Trial Measures on National Security Review of Foreign Investment in Free Trade Zones ( 自 由 贸 易 实 验 区 外 商 投 资 国 家 安 审 查 试 行 办 法 ), 8 May As used in this note, PRC refers to mainland China (not including Hong Kong, Macao and Taiwan). National Security Considerations in China s Financial Sectors an International Perspective 1
2 the maintenance of national security, sitting alongside such objectives as food security, strategic resources and cultural sovereignty. To achieve financial stability within the broader context of the continuing liberalisation of China s financial markets and the RMB, the PRC government is expected to replace the current system of approvals and other direct controls with a more indirect approach that still preserves regulatory flexibility (for example, macro-prudential financial management tools which allow for the tightening or loosening of policy according to economic conditions). This is being tested in certain free trade zones in the PRC, where a macroprudential parameter is embedded in the calculation of foreign debt limits, adjustable in accordance with capital movements and credit conditions or to the extent the scale of offshore financing needs to be limited on a temporary basis in the interests of national financial stability. 4 Although such measures may to a certain extent cast doubt over the pace of liberalisation of China s financial markets in the face of greater macroeconomic instability, reform of the financial markets is expected to continue in a way which will benefit China in the long term such as the change from an approval-based to a registration-based IPO system. National security review A national security review was introduced in the PRC in 2011 to enable more systematic monitoring of foreign investments in sensitive sectors, with an associated sanctions regime requiring the disposal by foreign investors of investments not submitted for review as required, and which were subsequently determined to have (or to be likely to have) a material impact on national security. Today, specific rules concerning national security review in the financial sector, though contemplated by the regime, have yet to be released. However, the expansion of the 2011 regime has taken shape through new rules issued in the free trade zones in May 2015 (see our earlier alert) which themselves embody the key principles of the national security review regime in the Draft Foreign Investment Law (which aims to achieve fundamental change in China s foreign investment regime) published by the Ministry of Commerce in January The free trade zones operate as a testing ground for new laws and regulations before they are introduced at national level. We would, accordingly, expect many key principles of the expanded regime to be applied to the financial sector as well. Below are some issues that may pose particular concerns in the financial sector: Regime extended to greenfield investment: the 2015 revisions extend foreign investments subject to national security review to greenfield investments (which is how many foreign financial sector investments are 4 Experimental Implementing Rules for Macro-prudential Management of Overseas Financing of Separately Accounted and Audited Business Units and Cross-border Fund Flows in the China (Shanghai) Free Trade Zone ( 中 国 ( 上 海 ) 自 由 贸 易 试 验 区 分 账 核 算 业 务 境 外 融 资 与 跨 境 资 金 流 动 宏 观 审 慎 管 理 实 施 细 则 ( 试 行 )), 12 February National Security Considerations in China s Financial Sectors an International Perspective 2
3 structured), while the scope of transactions covered by the existing national rules, which apply throughout the PRC other than in the free trade zones, only includes acquisitions of existing assets and businesses. Investment review factors: the National Security Law adopts a wide definition of national security which covers popular welfare, sustainable economic development and other vital interests of the State. Both the Draft Foreign Investment Law and the rules of the free trade zones prescribe an extensive list of factors to be considered in the national security review process, including the impact on key infrastructure and technology and whether the investments are made by persons controlled by a foreign government. These all signal that the factors guiding national security review of foreign investment in the financial sector, when the regime is finally put in place, are likely to be broad. Key technology: the National Security Law expands the national security regime beyond foreign investment review, to include key technologies and network information technology products and services which may affect national security. This expansion may pose particular concerns to international financial institutions operating in the PRC, given the crossborder nature of their organisational structures and the characteristics of their operations. Prevention of terrorism The prevention of terrorism is a key aspect in maintaining both national security and the security of the financial system. The Draft Anti-Terrorism Law reiterates the existing rules requiring financial institutions to conduct client identification and report suspicious transactions in order to prevent terrorism. In addition, the draft law goes further, in requiring that an institution (including a financial institution) must not facilitate, assist or transact with terrorist institutions or individuals and must report all such findings to the public security authorities. The next step may be for more detailed rules to be issued, which may ultimately impose more extensive obligations on financial institutions to conduct due diligence on certain clients and transactions and to cooperate with public security/national security authorities. In turn, the tightening of regulation in this area poses new challenges for financial institutions seeking to enter the mobile/internet payments market (characterised by large volumes of small transactions, for which extensive diligence requirements are impractical). PART B: IT INFRASTRUCTURE Article 25 of the National Security Law stipulates that the Chinese State shall develop systems to ensure the security of its networks and information, achieve secure and controllable information systems and data in key areas, prevent, deter and punish IT crime (such as disseminating harmful information over the internet), and safeguard the IT sovereignty of the State. National Security Considerations in China s Financial Sectors an International Perspective 3
4 As further illustrated in the Draft Cyber Security Law, which aims to legislate holistically for the protection of the sovereignty and integrity of China s IT networks, construction of a secure and stable network to withstand outside influence and interference is a main part of the national security strategy. Particular emphasis is placed on maintaining the integrity of key information infrastructure, which spans a wide range of regulated sectors of China s economy including telecoms, broadcasting, energy, transport, water conservancy and finance. General requirement to develop secure and controllable infrastructure Under the National Security Law, the strategic positioning and directional guidance of how key network infrastructure is to be sourced and developed is a key objective. Article 24 provides for the development of independent and controllable core critical technologies in key areas, while Article 25 contemplates the security and controllability of network and information core technologies. As shown in the CBRC and MIIT s Joint Guidance, 5 which called for the development of independent core applications, core knowhow and key technology even before the National Security Law was passed (and which has been extensively covered in our earlier alert), the banking sector is likely to be one of the key sectors in which the principles of Articles 24 and 25 will be applied. Within the context of the new law and its wider regime, reasonable interpretation would suggest that the consistent use of the word controllability, although undefined, contemplates not only the key technology owner/infrastructure operator s ability to control technical risk, but also the government s ability to direct the use of and access to networks without the co-operation of external parties (for example, the Joint Guidance combines national security requirements with those for innovation, independence, security and controllability). As many of the proposals are still in draft form and the revision of rules which will put the Joint Guidance into effect (currently in the form of the suspended Bank IT Guidance) 6 is still awaited, it is not entirely clear how these requirements will be implemented for banks. The proposals and principles released so far do, however, give a broad indication of the Chinese government s security priorities and financial institutions should plan for their future IT requirements with them in mind. 5 6 Guidance Opinion of the China Banking Regulatory Commission ( CBRC ), National Development and Reform Commission, Ministry of Science and Technology, and Ministry of Information Industry ( MIIT ) on the Use of Secure and Controllable Information Technology to Strengthen Network Security and Informatisation of the Banking Industry ( 关 于 应 用 安 全 可 控 信 息 技 术 加 强 银 行 业 网 络 安 全 和 信 息 化 建 设 的 指 导 意 见 ), 3 September 2014 (the Joint Guidance ). Notice of the General Offices of the CBRC and the MIIT on the Guidelines for Secure and Controllable Information Technology in the Banking Industry ( 中 国 银 监 会 办 公 厅 工 业 和 信 息 化 部 办 公 厅 关 于 印 发 银 行 业 应 用 安 全 可 控 信 息 技 术 推 进 指 南 ( 年 度 ) 的 通 知 ), 26 December 2014 (the Bank IT Guidance ). National Security Considerations in China s Financial Sectors an International Perspective 4
5 Supplier/partner selection The impending introduction of security and controllability requirements as discussed above may ultimately result in domestic IT equipment and solutions being preferred over foreign ones, in order to meet the additional compliance requirements. For example, the Joint Guidance contains key directives for banks to: increase their proportion of secure and controllable IT; give priority to technology and solutions which are more open, transparent and broadly applicable; co-operate with institutions which are willing to co-operate in respect of core knowledge and key technologies; and avoid reliance on a single product or technology. Though implementing rules which originally provided a timetable for how these goals are to be achieved (in the form of the Bank IT Guidance) have been informally suspended by the CBRC, global IT solution providers are already seeking the development of local solutions through partnerships with domestic entities, in anticipation of more specific independence and controllability requirements being issued. It is worth noting that the Bank IT Guidance had set out specific criteria for each category of IT product and service of banks, in most cases including suppliers having R&D and service centres in China and the associated software containing indigenous Chinese intellectual property. Further, the Draft Cyber Security Law proposes a national security review process for key information infrastructure operators (including financial institutions) purchasing network products and services that may influence national security, with the implementation rules still to be issued by the State Council. Though the content of the review is still unknown, the Bank IT Guidance already suggests an overall desire to impose regulatory review requirements on core systems (such as requirements to register source code powering operating systems, database software and middleware with the CBRC). Financial institutions therefore need to consider the potential impact of the proposed changes in evaluating potential suppliers to build out or upgrade their existing networks. It will also be interesting to see how the independence and controllability requirements can apply to foreign equipment for which no alternative is available domestically, and whether the authorities will extend any flexibility in this regard. In such cases, the use of foreign equipment and solutions could still involve a more protracted process as a result of the changes. IT specifications/certifications More specifically, Article 19 of the Draft Cyber Security Law would permit network operators and their third-party outsourcers to use only those products that have passed certification or security testing as equipment for key National Security Considerations in China s Financial Sectors an International Perspective 5
6 networks or for cyber security purposes. The Draft Cyber Security Law would require the national cyberspace administration authority, together with other ministries, to develop a catalogue of key network equipment and products specifically for IT security purposes and implement mutual recognition of security certification and inspection testing. The details are, however, unclear and it is uncertain whether it will lead to additional burdens (such as bringing new categories of equipment/solution within the scope of the rules, or introducing new certification/testing requirements) when implemented, despite the stated intention of the draft law to eliminate duplication of effort. Pre-installed backdoors and pre-clearance of encryption schemes In addition to these review requirements, what is more worrying is that the Draft Anti-Terrorism Law proposes to require certain features to be embodied in all networks, including preinstalled technical interfaces which can be used as security backdoors by the government authorities in preventing or investigating terrorist activities, and encryption schemes to be submitted to relevant PRC authorities for approval. In combating terrorism, the Draft Anti- Terrorism Law would empower the public security and state security organs to use telecommunications and internet technical interfaces to prevent and investigate terrorism, including requiring service providers/users to provide technical support for decryption. IT network regulation Levels of protection: the State Council is empowered under the Draft Cyber Security Law to formulate a classified IT security protection system, as well as specific rules on the safety of financial institutions important IT. The concern here is whether, and to what extent, the State Council s rules will go further than the existing IT security regulatory regime, thus imposing more compliance burdens. Key protective measures: the Draft Cyber Security Law would compulsorily require services such as network access and information publication to be provided on a real-name basis. In addition to routine compliance, more extensive obligations that would be imposed by the Draft Cyber Security Law include the categorisation of network data for the purpose of back-up and important data encryption, and putting in place an IT security emergency response plan and periodic drills. The Draft Cyber Security Law would also require operators of key information infrastructure to conduct, or appoint a specialist firm to conduct, tests and evaluations on their networks security and possible risks and report the results and corrective action to the responsible State Council departments for safety (including the relevant industry regulator and other departments) on at least an annual basis. These may significantly increase the costs to the network operators, including financial institutions, particularly given that the Draft Cyber Security Law and Anti-Terrorism Law overlap in some areas where the relationship between the two separate regimes is unclear. National Security Considerations in China s Financial Sectors an International Perspective 6
7 PART C: DATA SECURITY AND ONSHORING Banks are currently required to store, process and analyse all their personal financial information in the PRC, and are prohibited from transferring personal financial information out of the PRC in the absence of specific rules and regulations. 7 However, thus far it has been the accepted practice among foreign banks in the PRC for cross-border data transfer arrangements to be implemented with customer consent. The draft laws seek to expand these restrictions on transferring data out of the PRC beyond the banking sector and, if implemented, will affect how both onshore and offshore financial institutions structure their operations. Data onshoring Both the Draft Cyber Security Law and the Draft Anti-Terrorism Law propose data onshoring requirements with slightly different emphases. Read together, potentially, all corporate and personal data of domestic users obtained by any onshore internet service provider (including key information infrastructure operators such as banks and other financial institutions) through the provision of services in the PRC must be stored onshore in the PRC, and not transferred offshore (noting that the proposed requirements do not limit these prohibited transfers of data to internet transmission and could extend to physical and other forms of transmission), unless (i) otherwise permitted under law or regulation or (ii) a security assessment by the IT security and other State Council departments is completed (details of the process are not yet available). The effect of the above requirements could be profound, including in the following areas: Onshore infrastructure buildout: international financial institutions business models that are based on intra-group shared facilities could be significantly affected, with separate IT facilities having to be located onshore. Offshore legal and operational support (such as KYC and other data processing), client referrals by onshore to offshore units as well as internal auditing of onshore units by offshore headquarters may be made more difficult by the prohibitions against cross-border data sharing. Diligence: offshore service providers (such as financial advisers to PRC clients) will need to satisfy themselves that the cross-border transmission of information by PRC clients to them complies with the rules and does not need to go through national security assessment or, alternatively, that all relevant requirements have been met. Reduced information flow: in light of the proposed changes, offshore service providers may also consider restricting information flow from PRC clients (in particular, information that is identifiable to 7 Notice of the People s Bank of China ( PBOC ) on Urging Banking Financial Institutions to Do a Good Job in Protecting Personal Financial Data ( 中 国 人 民 银 行 关 于 银 行 业 金 融 机 构 做 好 个 人 金 融 信 息 保 护 工 作 的 通 知 ), 1 May National Security Considerations in China s Financial Sectors an International Perspective 7
8 the specific underlying clients of their PRC clients) to the extent feasible. Protection of personal data The Draft Cyber Security Law reiterates the current rules, which require financial institutions to prevent leakage, damage and loss of personal data and immediately rectify and report all such incidents to the competent authorities. Data subjects can require the financial institution to correct errors in the data it holds, and their consent must be obtained for their relevant information to be collected. More broadly, the Draft Cyber Security Law refers to different degrees of obligation being imposed in further detailed rules to classify data and back up/encrypt important data, depending on the perceived risk for the relevant data network. There is as yet no draft of these segmented rules available. Given the national legal status of the general obligations and their wide scope, it is possible that these rules, when passed, would result in additional personal data protection requirements. Data monitoring The National Security Law requires public participation in national security efforts through ongoing monitoring and reporting, and places all citizens, enterprises and organisations of the PRC under a duty to protect national security. The Draft Cyber Security Law and Draft Anti-Terrorism Law follow suit with proposed additional monitoring obligations that require network operators to be gatekeepers of the information published through their networks and monitor the information that is being disseminated to their users over their networks. If any dissemination of illegal information (such as information inciting ethnic discrimination, disturbing social order or relating to pornography, gambling, violence, murder or terrorism) is detected, the operator must immediately cease the transmission of the data, keep records of the transmission and report to the IT security authorities. As network operators, financial institutions would also be bound to comply with these obligations in relation to external and internal dissemination of information over their networks. National Security Considerations in China s Financial Sectors an International Perspective 8
9 Contacts Key References National Security Law of the PRC ( 中 华 人 民 共 和 国 国 家 安 全 法 ), 1 July 2015 (the National Security Law ). Anti-Terrorism Law of the People s Republic of China (Draft) ( 中 华 人 民 共 和 国 反 恐 怖 主 义 法 ( 草 案 )), 3 November 2014 (the Draft Anti-Terrorism Law ). Cyber Security Law of the PRC (Draft) ( 中 华 人 民 共 和 国 网 络 安 全 法 ( 草 案 )), 6 July 2015 (the Draft Cyber Security Law ). Guidance Opinion of the China Banking Regulatory Commission ( CBRC ), National Development and Reform Commission, Ministry of Science and Technology, and Ministry of Information Industry ( MIIT ) on the Use of Secure and Controllable Information Technology to Strengthen Network Security and Informatisation of the Banking Industry ( 关 于 应 用 安 全 可 控 信 息 技 术 加 强 银 行 业 网 络 安 全 和 信 息 化 建 设 的 指 导 意 见 ), 3 September 2014 (the Joint Guidance ). Notice of the General Offices of the CBRC and the MIIT on the Guidelines for Secure and Controllable Information Technology in the Banking Industry ( 中 国 银 监 会 办 公 厅 工 业 和 信 息 化 部 办 公 厅 关 于 印 发 银 行 业 应 用 安 全 可 控 信 息 技 术 推 进 指 南 ( 年 度 ) 的 通 知 ), 26 December 2014 (the Bank IT Guidance ). Notice of the People s Bank of China ( PBOC ) on Urging Banking Financial Institutions to Do a Good Job in Protecting Personal Financial Data ( 中 国 人 民 银 行 关 于 银 行 业 金 融 机 构 做 好 个 人 金 融 信 息 保 护 工 作 的 通 知 ), 1 May Authors: Grace Yu; Bryan Chan This publication is intended merely to highlight issues and not to be comprehensive, nor to provide legal advice. Should you have any questions on issues reported here or on other areas of law, please contact one of your regular contacts, or contact the editors. Linklaters LLP. All Rights reserved 2015 Linklaters LLP is a limited liability partnership registered in England and Wales with registered number OC It is a law firm authorised and regulated by the Solicitors Regulation Authority. The term partner in relation to Linklaters LLP is used to refer to a member of the LLP or an employee or consultant of Linklaters LLP or any of its affiliated firms or entities with equivalent standing and qualifications. A list of the names of the members of Linklaters LLP and of the non-members who are designated as partners and their professional qualifications is open to inspection at its registered office, One Silk Street, London EC2Y 8HQ, England or on This firm is not authorised under the Financial Services and Markets Act 2000 but we are able in certain circumstances to offer a limited range of investment services to clients because we are regulated by the Law Society of England and Wales. We can provide these investment services if they are an incidental part of the professional services we have been engaged to provide. We currently hold your contact details, which we use to send you newsletters such as this and for other marketing and business communications. We use your contact details for our own internal purposes only. This information is available to our offices worldwide and to those of our associated firms. If any of your details are incorrect or have recently changed, or if you no longer wish to receive this newsletter or other marketing communications, please let us know by ing us at marketing.database@linklaters.com. For further information please contact: Jian Fang Partner (+86) jian.fang@linklaters.com Betty Yap Partner (+852) betty.yap@linklaters.com Richard Gu Senior Consultant (+86) richard.gu@linklaters.com Grace Yu Managing Associate (+86) grace.yu@linklaters.com Adrian Fisher Managing Associate (+65) adrian.fisher@linklaters.com Linklaters LLP Shanghai Office 29th Floor, Mirae Asset Tower 166 Lujiazui Ring Road Shanghai , China Telephone (+86) Facsimile (+86) Linklaters 10th Floor, Alexandra House Chater Road, Hong Kong Telephone:(+852) Facsimile: (+852) Linklaters Singapore Pte. Ltd. One George Street #17-01 Singapore Telephone (+65) Facsimile (+65) National Security Considerations in China s Financial Sectors an International Perspective 9 A /0.17/09 Sep 2015
China pushes change in IT infrastructure by strengthening regulation of cyber security
April 2015 China pushes change in IT infrastructure by strengthening regulation of cyber security China pushes change in IT infrastructure by strengthening regulation of cyber security The CBRC s recent
More informationChina opens up its bank card payment clearing market
June 2015 China opens up its bank card payment clearing market The Decision to Implement Market Access Administration for Bank Card Clearing Institutions (the Decision ) of the State Council, which came
More informationOne Step Closer to Liberalisation Formal Unveiling of the Shanghai Free Trade Zone s Free Trade Account.
June 2014 One Step Closer to Liberalisation Formal Unveiling of the Shanghai Free Trade s Free Trade Account. New rules published by PBOC Shanghai on 22 May provide much needed practical guidance on the
More informationChina's New Company Registration Regime.
February 2014 China's New Company Registration Regime. In recent months, China s central government has unveiled a range of initiatives to reduce the regulatory burden of businesses and provide greater
More informationHong Kong IPO Sponsor Reforms.
December 2012 Hong Kong IPO Sponsor Reforms. Background The Securities and Futures Commission (the SFC ) published on 12 December 2012 its Consultation Conclusions on the Regulation of IPO Sponsors (the
More informationMineral, Oil and Gas Companies - Listing on SGX.
December 2013 Mineral, Oil and Gas Companies - Listing on SGX. New eligibility criteria and on-going obligation requirements Background In September 2013, Singapore Exchange Securities Trading Limited
More informationRelaxation of PRC regulatory restrictions on cross-border security and guarantees
May 2014 Relaxation of PRC regulatory restrictions on cross-border security and guarantees 1 Introduction After much anticipation 1, SAFE has finally published the Regulation on Foreign Exchange Administration
More informationShanghai-Hong Kong Stock Connect: New short selling rules.
March 2015 Shanghai-Hong Kong Stock Connect: New short selling rules. With the launch of the Shanghai-Hong Kong Stock Connect ( Stock Connect ) in November of last year, foreign investors now have direct
More informationTrading Halt Conclusions from the Hong Kong Stock Exchange s Consultation
March 2013 Trading Halt Conclusions from the Hong Kong Stock Exchange s Consultation The Stock Exchange of Hong Kong Limited (the Exchange) published the conclusions to its Consultation on Trading Halts
More informationPersonal Data (Privacy) (Amendment) Ordinance 2012 - Use and Sale of Personal Data for Direct Marketing.
July 2012 Personal Data (Privacy) (Amendment) Ordinance 2012 - Use and Sale of Personal Data for Direct Marketing. Contents Introduction On 27 June 2012, Hong Kong s Legislative Council ( LegCo ) passed
More informationUse or Transfer of Personal Data for Direct Marketing
February 2013 Changes to Direct Marketing Privacy Laws come into force on 1 April 2013 Introduction The Personal Data (Privacy) (Amendment) Ordinance 2012 (the Amendment Ordinance ), introduced some important
More informationShanghai Free Trade Zone: what you need to know to date and what to expect
December 2014 Shanghai Free Trade Zone: what you need to know to date and what to expect Introduction Since its official launch on 29 September 2013, the China (Shanghai) Free Trade Zone (the Zone ) has
More informationFSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers
July 2011 FSA reports on how banks deal with high-risk customers, correspondent banking relationships and wire transfers FSA reports on how banks deal with high-risk customers, correspondent banking 1
More informationShip finance leasing in China
Ship finance leasing in China FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES Jonathan Silver Of Counsel, Norton
More informationCyber Security and the Impact on Banks in China
Cyber Security and the Impact on Banks in China Regulatory Policy Development and Updates March 015 kpmg.com/cn Executive Summary The China Banking Regulatory Commission (CBRC) issued two circulars (Circulars
More informationRupiah requirement on transactions in Indonesia update
Client Update Rupiah requirement on transactions in Indonesia update Revised June 2015 On 31 March 2015, the Indonesian central bank (Bank Indonesia) issued Bank Indonesia Regulation No. 17/3/PBI/2015
More informationThe Cloud and Cross-Border Risks - Singapore
The Cloud and Cross-Border Risks - Singapore February 2011 What is the objective of the paper? Macquarie Telecom has commissioned this paper by international law firm Freshfields Bruckhaus Deringer in
More informationEuropean Commission releases final report on business insurance sector inquiry
Insurance Update. European Commission releases final report on business insurance sector inquiry The Commission has published the final report of its competition inquiry into the business insurance sector.
More informationFSA paper on conflicts of interest between asset managers and their customers
November 2012 FSA paper on conflicts of interest between asset managers and their customers The FSA issued a warning to asset managers to step up their compliance with FSA rules relating to conflicts of
More informationNew UK Premium and Standard Listing Regime.
March 2010 New UK Premium and Standard Listing Regime. The new premium and standard segments of the UK listing regime take effect on 6 April and the FSA has now published the final rule amendments needed
More informationSingapore Consults on OTC Derivatives Regulation.
February 2012 Singapore Consults on OTC Derivatives Regulation. On 13 February 2012, the Monetary Authority of Singapore ( MAS ) released its Consultation Paper on Proposed Regulation of OTC Derivatives
More informationBriefing Note UAE Corporate Governance Regime
February 2010 Briefing Note UAE Corporate Governance Regime At a Glance > Corporate governance is the system by which companies are directed and controlled. It deals largely with the relationship between
More informationChanges relating to age 75 and flexible drawdown
October 2011 Registered pension schemes: Changes relating to age 75 and flexible drawdown This year s Finance Act makes a number of changes from 6 April 2011, concerning the impact that reaching age 75
More informationHong Kong Proposes Margin and Risk Mitigation Standards for Non-Centrally Cleared OTC Derivatives
30 December 2015 Hong Kong Proposes Margin and Risk Mitigation Standards for Non-Centrally Cleared OTC Derivatives Introduction On 3 December 2015, the Hong Kong Monetary Authority ( HKMA ) issued a consultation
More informationForeign investment in the United Arab Emirates.
March 2011 Foreign investment in the United Arab Emirates. Overview Regional insight and awareness of the local legal landscape is key for global companies and financial institutions doing business in
More informationShanghai-Hong Kong Stock Connect: Are You Ready for the Through Train to Shanghai?
September 2014 : Are You Ready for the Through Train to Shanghai? Market participants in the Hong Kong market eagerly await what will be one of the most major developments in the equity market: the October
More information18 August 2015. 1. Amendments to the participation exemption regime
18 August 2015 Luxembourg draft legislation introducing EU anti hybrid and anti-abuse provisions in the participation exemption regime and a horizontal consolidation tax regime. On 5 August 2015, the Minister
More informationSubstance requirements applying to Luxembourg UCITS management companies and to Luxembourg self-managed UCITS investments companies
October 2012 Substance requirements applying to Luxembourg UCITS management companies and to Luxembourg self-managed UCITS investments companies Contents Introduction On 26 October 2012, the Commission
More informationAIFMD implementation in Germany: Draft Capital Investment Act revised Government draft addresses industry criticism
December 2012 AIFMD implementation in Germany: Draft Capital Investment Act revised Government draft addresses industry criticism Government draft of Capital Investment Act published On 12 December 2012,
More informationEU publishes mandatory Collective Action Clause for use in eurozone sovereign bonds from 1 January 2013
May 2012 EU publishes mandatory Collective Action Clause for use in eurozone sovereign bonds from 1 January 2013 Contents 1 Overview In February 2012, eurozone member states signed a modified version of
More informationHow To Avoid Inheritance Tax On A Pension Scheme
September 2013 Occupational pension schemes: Lump sum death benefits: Tax issues Here we look at the main tax issues which arise in relation to lump sum death benefit payments. We shall start with tax-registered
More informationUnder the Cybersecurity Law, network operators are obligated to consider the following security
On July 6, 2015, the Standing Committee of the National People s Congress (NPCSC) of the People s Republic of China published a draft on Cybersecurity Law. A public comment period on the Cybersecurity
More informationMiFID II: The New Investor Protection Regime
May 2014 Overview On 13 May 2014, the Council of the European Union formally endorsed a new regulatory regime that will replace the current Markets in Financial Instruments Directive ( MiFID ), which has
More informationChina's new national security law creates more insecurity for foreign businesses
China's new national security law creates more insecurity for foreign businesses Contents Overview 1 JULY Broad definition of national security 1 Expanded national security review regime 1 NSR in relation
More informationAdministration of Internet Information Services Procedures
Administration of Internet Information Services Procedures Full text Article 1 These Procedures have been formulated in order to regulate internet information service activities and promote the healthy
More informationKing & Wood Mallesons /
KWM Connect QFII and RQFII a practical insight to recent developments by Richard Mazzochi, Minny Siu and Hayden Flinn King & Wood Mallesons / KWM Connect 1 In the opening session of the Asia Financial
More informationMiFID II. Key interactions between MiFID/MiFIR II and other EU and US financial services legislation.
July 2012 MiFID II. Key interactions between MiFID/MiFIR II and other EU and US financial services legislation. Introduction MiFID is often described as the corner stone of financial services regulation
More informationImplementation of the Jackson Reforms. The key changes.
March 2013 Implementation of the Jackson Reforms. The key changes. Introduction On 1 April 2013, a large tranche of the reforms proposed by the 2010 review of civil litigation costs by Lord Justice Jackson
More informationHow To Make Money In Indonesia
Client Update An overview of the Indonesian insurance industry for foreign investors 21 February 2014 The Indonesian insurance market has attracted significant interest from international investors in
More informationChina: New Rules on Foreign Investment Through Merger or Acquisition
China: New Rules on Foreign Investment Through Merger or Acquisition The new Provisions on Mergers and Acquisitions of Domestic Enterprises by Foreign Investors (the "New M&A Rules") were promulgated on
More informationRecognition of Funds (MRF) A new era for asset management in China and Hong Kong
www.pwchk.com Mainland and Hong Kong Mutual Recognition of Funds (MRF) A new era for asset management in China and Hong Kong Getting ready to access the China and Hong Kong asset management markets Foreword
More informationFinal Foreign Private Adviser and Private Fund Adviser Rules Issued by the U.S. Securities and Exchange Commission.
July 2011 Final Foreign Private Adviser and Private Fund Adviser Rules Issued by the U.S. Securities and Exchange Commission. Contents Implications for Non-U.S. Investment Advisers On June 22, 2011, the
More informationFCA changes client money and custody asset rules
June 2014 This note provides a summary of the extensive changes to the client money and custody rules for investment firms Overview The Financial Conduct Authority ( FCA ) released on 10 June 2014 a new
More informationMiFID II: The new market structure paradigm
February 2014 MiFID II: The new market structure paradigm Overview On 14 January 2014, after months of negotiations, EU legislators reached political agreement on reforms to the Markets in Financial Instruments
More informationOutsourcing. FSA Regulated firms (including offshore outsourcing) Contents. March 2004
Outsourcing FSA Regulated firms (including offshore outsourcing) March 2004 Contents 2. Introduction 2. How do the regulations impact an outsourcing? 3. Prudential Sourcebooks 4. Service Level Agreements
More informationRevised security regimes in Africa: the OHADA reforms
Revised security regimes in Africa: the OHADA reforms Contents A revised security regime is about to come into force in 16 Sub-Saharan African jurisdictions. The new regime will improve the process of
More informationHow To Protect The Internet In The Germany
Computer Information Network and Internet Security, Protection and Management Regulations (Original translation provided by the US Embassy in Beijing) (Approved by the State Council on December 11 1997
More informationProgram trading in China will be regulated
Program trading in China will be regulated 1 Briefing note October 2015 Program trading in China will be regulated The significant drop in the value of China's stock market since June 2015 has prompted
More informationHot Topics in International Debt Capital Markets. Paul Browne Louis-Maël Cogis Jay Lee Enrico Leone Piers Summerfield
Hot Topics in International Debt Capital Markets Paul Browne Louis-Maël Cogis Jay Lee Enrico Leone Piers Summerfield October 2015 Who we are and what we will cover Introduction to the team Things we will
More informationWal-Mart Acquisition Shows China E-Commerce Is Opening Up
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Wal-Mart Acquisition Shows China E-Commerce Is Opening
More informationSingapore: Insolvency Law Review Committee Recommendations.
November 2013 Singapore: Insolvency Law Review Committee Recommendations. Contents 1 Background In December 2010, the Minister of Law of Singapore (the MoL ) appointed the Insolvency Law Review Committee
More informationNew board pay rules are they working? Key statistics
New board pay rules are they working? Key statistics Linklaters Incentives Practice New board pay rules are they working? Many of the world s largest companies rely on our global incentives practice to
More informationCayman Islands Companies: The Asia Connection
BERMUDA BRITISH VIRGIN ISLANDS CAYMAN ISLANDS CYPRUS DUBAI HONG KONG LONDON MAURITIUS MOSCOW SÃO PAULO SINGAPORE conyersdill.com December 2010 Cayman Islands Companies: The Asia Connection The Cayman Islands
More informationCommercial Banks to Launch Fund Management Companies
Commercial Banks to Launch Fund Management Companies Christophe Han and Charles Qin Following an extended period of solicitation of opinions and a heated debate on the issues of commercial bank's incorporation
More informationCHINA UPDATE: CHINA (SHANGHAI) PILOT FREE TRADE ZONE SPECIAL EDITION November - December 2013
CHINA UPDATE: CHINA (SHANGHAI) PILOT FREE TRADE ZONE SPECIAL EDITION November - December 2013 China (Shanghai) Pilot Free Trade Zone Framework Released... 1 Tax and Customs Policies in the Zone... 3 Reformation
More informationMeasures for Shanghai-Hong Kong Stock Connect Pilot Program by the Shanghai Stock Exchange
Measures for Shanghai-Hong Kong Stock Connect Pilot Program by the Shanghai Stock Exchange Disclaimer: The Chinese version of the rules issued by the Shanghai Stock Exchange shall prevail, while the English
More informationIFRS APPLICATION AROUND THE WORLD JURISDICTIONAL PROFILE: People s Republic of China
IFRS APPLICATION AROUND THE WORLD JURISDICTIONAL PROFILE: People s Republic of China Disclaimer: The information in this Profile is for general guidance only and may change from time to time. You should
More informationBrief guide to Administration
Brief guide to Administration Administration is a rescue procedure for companies that are, or are likely to become, insolvent. It is similar in concept to Chapter 11 proceedings in the United States but
More informationE-commerce liberalization in China: State Council and MIIT push forward
E-commerce liberalization in China: State Council and MIIT push forward Contents State Council orders government agencies to take liberalization steps 1 JUNE [ MIIT removes foreign ownership restrictions
More informationCatalogue of Major Existing Laws and Regulations in Effect on Foreign Exchange Administration (as of June 30, 2015) 1
Catalogue of Major Existing Laws and Regulations in Effect on Foreign Exchange Administration (as of June 30, 2015) 1 I. General (24 Items) 1- Basic Rules 1. Regulations of the People's Republic of China
More informationA Cautionary Tale When Considering Yieldco Dropdown and Other Related Party Transactions: In re: El Paso Pipeline Partners, L.P. Derivative Litigation
June 2015 A Cautionary Tale When Considering Yieldco Dropdown and Other Related Party Transactions: In re: El Paso Pipeline s, L.P. Derivative Litigation Sponsors of yieldcos, master limited partnerships
More informationSAS v World Programming: Court of Appeal considers copyright in software.
December 2013 SAS v World Programming: Court of Appeal considers copyright in software. Contents Summary On 21 November 2013 the Court of Appeal gave its decision in the leading software copyright case
More informationPilot Free Trade Zone Shanghai
Pilot Free Trade Zone Shanghai Shanghai s first Free Trade zone was launched in September 2013, targeted to make Shanghai an international trade and finance hub. It was established on the strategic decision
More informationTopicsinChineseLaw AN O'MELVENY & MYERS LLP RESEARCH REPORT. China's Regulation of "Round Trip Investments" * by Howard Chao and Kaichen Xu **
TopicsinChineseLaw AN O'MELVENY & MYERS LLP RESEARCH REPORT January 2008 China's Regulation of "Round Trip Investments" * by Howard Chao and Kaichen Xu ** During the past couple of years, China has been
More informationBermuda Public Companies Offshore Companies Onshore Exchanges
Bermuda Public Companies Offshore Companies Onshore Exchanges Foreword This memorandum has been prepared for the assistance of those who are considering the formation of public companies in Bermuda. It
More informationCFTC Aligns Regulation of Certain DCOs with International Standards
January 2, 2014 CFTC Aligns Regulation of Certain DCOs with International Standards Key Takeaways: > In November of 2013, the CFTC adopted regulations for systemically important DCOs, and other DCOs that
More informationIndependent Commission on Banking Final Report on UK Banking Reform
Independent Commission on Banking Final Report on UK Banking Reform 13 September 2011 1. Introduction The UK Independent Commission on Banking (the ICB ) published its final report on 12 September 2011.
More informationMeasures for Security Protection Administration of the International. Networking of Computer Information Networks
Measures for Security Protection Administration of the International Networking of Computer Information Networks Full text Chapter I General Provisions Chapter II Security Protection Liability Chapter
More informationAsset management. Briefing. Establishing an asset management presence in Hong Kong and Singapore. Introduction. Hong Kong
Asset management FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES Briefing August 2011 Establishing an asset management
More informationProcessor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationShared Parental Leave: Nine Months and Counting Understanding employee attitudes to shared parental leave
Shared Parental Leave: Nine Months and Counting Understanding employee attitudes to shared parental leave * This PDF is best viewed and printed in landscape Introduction About the survey This report is
More informationNew FSA rules on disclosure of interests in UK companies
New FSA rules on disclosure of interests in UK companies The FSA s new rules on Disclosure of Contracts for Difference, which come into force on 1 June 2009, will considerably extend the scope of the disclosure
More informationengagement will not only ensure the best possible law, but will also promote the law s successful implementation.
US-China Business Council Comments on The Draft Cybersecurity Law On behalf of the approximately 210 members of the US-China Business Council (USCBC), we appreciate the opportunity to provide comments
More informationUK Employee Incentives and Benefits
UK Employee Incentives and Benefits About our UK Employee Incentives and Benefits Team The UK Employee Incentives and Benefits team at Bird & Bird design, draft and implement employee share plans and other
More informationE-commerce in China. How can you get a piece of the action? Summary. Introduction
E-commerce in China How can you get a piece of the action? Summary On 19, Alibaba launched the largest IPO in US history, raising US$21.8bn on its debut on the New York Stock Exchange. The Chinese internet
More informationShare with a colleague. 16 July 2012 Hong Kong. Awards. Background. International TMT Team of the Year China Law & Practice Awards, 2011
Page 1 of 2 Breaking news: PRC telecoms market finally open for private domestic and foreign investments? On 27 June 2012, the Ministry of Industry and Information Technology released a ground-breaking
More informationInvestment Management Alert
Investment Management Alert May 29, 2015 The CSRC and the SFC Announces Launch of the Mainland-Hong Kong Mutual Recognition of Funds Scheme Introduction On May 22, 2015, the Hong Kong Securities and Futures
More informationComments on CBRC Draft Regulations Affecting Technology Purchases. 14 September 2015
Introduction Comments on CBRC Draft Regulations Affecting Technology Purchases 14 September 2015 The American Chamber of Commerce in China, American Chamber of Commerce in Shanghai, Asia Securities Industry
More informationLunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner
Lunch & Learn: Recent Challenges for International Technology Companies in China 19 January 2015 Presented By Paul McKenzie and Gordon Milner mofo.com Lunch & Learn 2 nd Monday of each month 45 minutes
More informationBasel III and project finance
July 2011 Basel III and project finance In this article, published by Project Finance International (Issue 460), Edward Chan and Matthew Worth go through what Basel III means and the impact on projects
More informationForeign Investor s Chance to Invest in RMB EIE/EIFs by Means of RFDI
Llinks Corporate Bulletin April 2012 New Means for Foreign Investors to Invest in RMB Equity Investment Funds: By David Yu, Nicholas Lou and Kevin Huang Ever since the promulgation of the Administrative
More informationBig Data for Mutuals. Marc Dautlich 25 November 2013
Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?
More informationWelcome to our Summer London seminar programme 2016
Welcome to our Summer London seminar programme 2016 Contents Welcome to our London seminar programme May 2016 June 2016 June 2016 June 2016 July 2016 The increasing cooperation between U.S. enforcers and
More informationBrief guide to English Corporate Insolvency Law
Brief guide to English Corporate Insolvency Law The main English Insolvency Procedures. This guide deals with the main insolvency procedures in England and Wales, namely: > Administration, which is primarily
More informationCompanies Act 2006. Capital reductions and share buybacks. April 2008
Companies Act 2006 Capital reductions and share buybacks April 2008 Introduction Under the Companies Act 2006, private companies will from 1 October 2008 be able to make a reduction of capital without
More informationForeign direct investment in the consumer products and retail sector in China
Foreign direct investment in the consumer products and retail sector in China Permitted investment vehicles Since December 2004, foreign retailers have been permitted to establish Foreign Invested Commercial
More informationSTRUCTURING A BUSINESS AS A LIMITED LIABILITY PARTNERSHIP (LLP)
STRUCTURING A BUSINESS AS A LIMITED LIABILITY PARTNERSHIP (LLP) CORPORATE LAW INTRODUCTION Partnerships have been used for many years as flexible business vehicles for enterprises, especially where they
More informationLegislative Council Panel on Information Technology and Broadcasting. Information Security
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
More information2015 The Law Society. All rights reserved.
HMRC: Tackling offshore tax evasion: Civil Sanctions for enablers of offshore evasion Strengthening civil deterrents for offshore evaders A new corporate criminal offence of failure to prevent the facilitation
More informationUAE Investment Funds Regulation implemented
UAE Investment Funds Regulation implemented beginning of the end for the tolerated practice? 1 Briefing note August 2012 UAE Investment Funds Regulation implemented The UAE Securities and Commodities Authority
More informationChina Securities Depository and Clearing Corporation Limited
China Securities Depository and Clearing Corporation Limited Rules on the Management of Securities Accounts Chapter 1: General Principles Article 1.1: In a bid to strengthen the securities account administration
More informationNew UAE Commercial Companies Law: Legal reforms to strengthen the legal and regulatory landscape of doing business in the UAE
from Legal Middle East New UAE Commercial Companies Law: Legal reforms to strengthen the legal and regulatory landscape of doing business in the UAE May 2015 In brief After years of speculation regarding
More informationTax risk management strategy
Vodafone Group Plc has a tax strategy focused on the following 6 key areas: Integrity in compliance and reporting Enhancing shareholder value Business partnering Influencing tax policy Developing our people
More informationBanking and financial services outsourcing in Asia: the legal and regulatory essentials
Briefing Banking and financial services outsourcing in Asia: the legal and regulatory essentials Summary Asia s banking and financial services sector is increasingly looking to outsourcing and offshoring
More informationThird Party Payment Licences in China - Are They within The Grasp of Foreign Investors?
Third Party Payment Licences in China - Are They within The Grasp of Foreign Investors? Contents Payment Licenses 1 Telecoms Licences 2 JUNE International Remittances 3 Comments 4 Third Party Payment Licences
More informationINDUSTRY OVERVIEW OUTSOURCING OF SOFTWARE DEVELOPMENT AND SERVICES
The information presented in this section and elsewhere in this prospectus relating to the software market of selective countries is derived from various publications and news reports. Such information
More informationRegulations on Administration of Internet News Information Services
Regulations on Administration of Internet News Information Services (Promulgated by the Press Office of the State Council and Ministry of Information Industry on 25 September 2005 and effective as of date
More informationSenior insurance managers regime: a new regulatory framework for individuals
December 2014 Senior insurance managers regime: a new regulatory framework for individuals 1 Introduction On 26 November 2014, Prudential Regulation Authority ( PRA ) published a consultation paper relating
More informationLEGAL FLASH I SHANGHAI OFFICE
LEGAL FLASH I SHANGHAI OFFICE Special edition 2013 INDEX UPDATE ON TAX REGULATIONS 2013 2 INTERIM PROVISIONS ON LABOR DISPATCH 5 UPDATE ON TAX REGULATIONS 2013 We started our special edition updates last
More information